Information about the opponent is essential to improve automated negotiation strategies for bilateral multiissue negotiation. In this paper we propose a negotiation strategy that e...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Chordal graphs can be used to encode dependency models that are representable by both directed acyclic and undirected graphs. This paper discusses a very simple and efficient algo...
This paper uses the URL word breaking task as an example to elaborate what we identify as crucialin designingstatistical natural language processing (NLP) algorithmsfor Web scale ...
Kuansan Wang, Christopher Thrasher, Bo-June Paul H...
We develop a novel user-centric modeling technology, which can dynamically describe and update a person's expertise profile. In an enterprise environment, the technology can e...
Xiaodan Song, Belle L. Tseng, Ching-Yung Lin, Ming...